LEADER 01377nas# 22002891i 450 001 UON00035739 005 20231205102122.14 100 $a20020107a1998 |0itac50 ba 101 $aeng 102 $aJP 105 $a|||| 1|||| 110 $aaU||||||||| 200 1 $aAge of tomorrow 207 $a - 1998 210 $aTokyo$d - 1998 v. ; 21 cm Periodicità sconosciuta 215 $aLa pubblicazione termina con il fasc. 146(1998) 620 $aJP$dTo?kyo?$3UONL000031 686 $aJP$cGIAPPONE - PERIODICI$2A 686 $aDONO$cPERIODICI - DONO$2A 686 $aSPENTI$cPERIODICI - SPENTI$2A 712 $aHitachi Ltd.$3UONV251822$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI$41994 *133* 1996 *139>141* 1997 *142* 1988 *146*$cPer Misc 121 GEOGRAFIA 6°PIANO ; 912 $aUON00035739 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$bSI 1994 *133* 1996 *139>141* 1997 *142* 1988 *146*$dSI A Per Misc 121 1994 $eSI SA 80228 7 1994 $dSI A Per Misc 121 1997 $eSI SA 86282 7 1997 $dSI A Per Misc 121 1998 $eSI SA 88393 7 1998 996 $aAge of tomorrow$91321026 997 $aUNIOR LEADER 03171nam 22007575 450 001 9910485029703321 005 20251225212348.0 010 $a3-319-70500-8 024 7 $a10.1007/978-3-319-70500-2 035 $a(CKB)4340000000223540 035 $a(DE-He213)978-3-319-70500-2 035 $a(MiAaPQ)EBC5590656 035 $a(PPN)22125160X 035 $a(EXLCZ)994340000000223540 100 $a20171104d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTheory of Cryptography $e15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I /$fedited by Yael Kalai, Leonid Reyzin 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XVII, 812 p. 80 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10677 311 08$a3-319-70499-0 330 $aThe two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10677 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aComputers and civilization 606 $aComputer networks 606 $aApplication software 606 $aCryptology 606 $aData and Information Security 606 $aLegal Aspects of Computing 606 $aComputers and Society 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aComputers and civilization. 615 0$aComputer networks. 615 0$aApplication software. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aLegal Aspects of Computing. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 676 $a005.8 702 $aKalai$b Yael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aReyzin$b Leonid$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910485029703321 996 $aTheory of Cryptography$93000229 997 $aUNINA